Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe
Resource
win7-20240903-en
General
-
Target
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe
-
Size
333KB
-
MD5
8dd4853010e7db531898aa198b116300
-
SHA1
839c24033a06b4f9ff2abd065f12cbdec61d83e0
-
SHA256
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f
-
SHA512
1be5cbce7454acf89b94ec27ef1f9c74c3a8ef53bb6a93dc3ca9243ef9a5d612b1400d7215a4107e95512f7f073c65e3ba7d90f735db74c990830acf0444b5f6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9W:vHW138/iXWlK885rKlGSekcj66ciWW
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2908 qukel.exe 1860 akdup.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 2908 qukel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qukel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language akdup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe 1860 akdup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2908 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 2136 wrote to memory of 2908 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 2136 wrote to memory of 2908 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 2136 wrote to memory of 2908 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 2136 wrote to memory of 2988 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 2136 wrote to memory of 2988 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 2136 wrote to memory of 2988 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 2136 wrote to memory of 2988 2136 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 2908 wrote to memory of 1860 2908 qukel.exe 35 PID 2908 wrote to memory of 1860 2908 qukel.exe 35 PID 2908 wrote to memory of 1860 2908 qukel.exe 35 PID 2908 wrote to memory of 1860 2908 qukel.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe"C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\qukel.exe"C:\Users\Admin\AppData\Local\Temp\qukel.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\akdup.exe"C:\Users\Admin\AppData\Local\Temp\akdup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56fadf302779de6a35911ec20f44eaa9c
SHA1badefcb45d3e18eb9a4af1b8f9b53ba321fd4d26
SHA25680beb48d4f4f11b66385e3347cb54777a8376fc918532c6def8af74f6ee9e4a0
SHA512be028304116ebc759a74721b3d98f97f5948dcdd0767ad86a91e21daec21bd87407ce885c4c7e08f609d1ce89044bdbb04e6db2f1107b73bf344c74993d45001
-
Filesize
512B
MD5e0de42debd653f5e18682743029d7fbd
SHA174017ebc3de68e8baf09a07412b6a7d49e0a9f8e
SHA256665c37956e76d11941218b931f39d1558bbc2621f175d6a8a00da84a1b5310cd
SHA512739fdb02e62c9dbe0e23405bff2b74c082c5de40fde38852dc82ebf1bc8e8d9516f6020c0d19d95dcd4603245d353cb61a1d598a31bca825b016419413cfee03
-
Filesize
172KB
MD5497b65cfe46eb9f4b8cda4a9b6e47e1c
SHA1957b011d0c595652ad1d3717571256136c2c199d
SHA25632216fdd696285d72dd9d00b1e6aaaabd4271cd761e2d0f4d7156e420b742792
SHA512326bab391189cd0e634befdfe7047e59129a17ee7da23d7d77cb0e2dec9baf0fcf577bb66c4f8764974775dbec2a24ad8359829d4fdbbd995790e39d883e14e1
-
Filesize
333KB
MD5b4cc42c9b0b0a705072efe609e6983b7
SHA1a26343ba4401d8abcfb47425dd7734f8ff427038
SHA256d1361f731d0e2f7085a9c06493eba55f727b6eeae9b7dca5a723413c39ab1da8
SHA5120f7985b33e161ef9b96b345d2133d175e292f055ec14b4ac32f1a0dc7f0890a9c5bc17f0f277ade623ccfdb17141c6e5b4121c9c3bb0b29aa08716982966f342